메뉴 건너뛰기




Volumn 13, Issue 3, 2010, Pages

The Role Mining Problem: A formal perspective

Author keywords

RBAC; Role engineering; Role mining

Indexed keywords

DATA ANALYSIS; HEURISTIC SOLUTIONS; INTERESTINGNESS; KEY PROBLEMS; MINING PROBLEMS; NP COMPLETE PROBLEMS; OPTIMAL SETS; RBAC; ROLE ENGINEERING; ROLE-BASED ACCESS CONTROL; THEORETICAL BOUNDS;

EID: 77955190756     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1805974.1895983     Document Type: Conference Paper
Times cited : (70)

References (31)
  • 12
    • 0000947357 scopus 로고    scopus 로고
    • Approximating clique and biclique problems
    • HOCHBAUM, D. S. 1998. Approximating clique and biclique problems. J. Algorithms 29, 1, 174-200.
    • (1998) J. Algorithms , vol.29 , Issue.1 , pp. 174-200
    • Hochbaum, D.S.1
  • 16
    • 51249163234 scopus 로고
    • Ordering d-classes and computing schein rank is hard
    • MARKOWSKY, G. 1992. Ordering d-classes and computing schein rank is hard. Semi-Group Forum 44, 373-375.
    • (1992) Semi-Group Forum , vol.44 , pp. 373-375
    • Markowsky, G.1
  • 18
    • 34548041366 scopus 로고    scopus 로고
    • master's thesis M.S. thesis, University of Helsinki
    • MIETTINEN, P. 2006. The discrete basis problem, master's thesis. M.S. thesis, University of Helsinki.
    • (2006) The Discrete Basis Problem
    • Miettinen, P.1
  • 24
    • 0141998079 scopus 로고    scopus 로고
    • Themaximum edge biclique problem is np-complete
    • PEETERS, R. 2003. Themaximum edge biclique problem is np-complete. Discrete Appl. Math. 131, 3, 651-654.
    • (2003) Discrete Appl. Math. , vol.131 , Issue.3 , pp. 651-654
    • Peeters, R.1
  • 25
    • 0033646113 scopus 로고    scopus 로고
    • Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization
    • ACM, New York
    • ROECKLE, H., SCHIMPF, G., AND WEIDINGER, R. 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of the 5th Workshop on Role-based Access Control. ACM, New York, 103-110.
    • (2000) Proceedings of the 5th Workshop on Role-based Access Control , pp. 103-110
    • Roeckle, H.1    Schimpf, G.2    Weidinger, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.